Chapter 11
Computer Security,
Ethics and Privacy
Chapter 11 Objectives
Describe
Describethe
thetypes
typesof
ofcomputer
computersecurity
securityrisks
risks
Discuss
Discussthe
thetypes
typesof
ofdevices
devicesavailable
availablethat
that
protect
protectcomputers
computersfrom
fromsystem
systemfailure
failure
Identify
Identifyways
waysto
tosafeguard
safeguardagainst
against
computer
viruses,
worms,
Trojan
computer viruses, worms, Trojanhorses,
horses,
botnets,
botnets,denial
denialof
ofservice
serviceattacks,
attacks,back
back
doors,
doors,and
andspoofing
spoofing
Explain
Explainthe
theoptions
optionsavailable
availablefor
forbacking
backingup
up
computer
computerresources
resources
Discuss
Discusstechniques
techniquesto
toprevent
preventunauthorized
unauthorized
computer
computeraccess
accessand
anduse
use
Identify
Identifysafeguards
safeguardsagainst
againsthardware
hardwaretheft
theft
and
andvandalism
vandalism
Explain
Explainthe
theways
wayssoftware
softwaremanufacturers
manufacturers
protect
protectagainst
againstsoftware
softwarepiracy
piracy
Define
Defineencryption
encryptionand
andexplain
explainwhy
whyititisis
necessary
necessary
Identify
Identifyrisks
risksand
andsafeguards
safeguardsassociated
associatedwith
with
wireless
wirelesscommunications
communications
Recognize
Recognizeissues
issuesrelated
relatedto
toinformation
information
accuracy,
accuracy,rights,
rights,and
andconduct
conduct
Discuss
Discussissues
issuessurrounding
surroundinginformation
information
privacy
privacy
Discuss
Discussways
waysto
toprevent
preventhealth-related
health-related
disorders
disordersand
andinjuries
injuriesdue
dueto
tocomputer
computeruse
use
Next
Next
Can spread
and damage
files
p. 558
Worm copies
itself repeatedly,
using up
resources
and possibly
shutting down
computer or
network
Trojan horse
hides within
or looks like
legitimate
program until
triggered
Does not
replicate
itself on
other
computers
Payload
(destructive
event) that is
delivered when
you open file, run
infected program,
or boot computer
with infected disk
in disk drive
Next
Next
CLICK TO START
Next
Next
Next
Antivirus programs
look for virus
signatures
Next
Next
Install an antivirus
program on all of
your computers
Check all
downloaded
programs for
viruses, worms,
or Trojan horses
Never open an
e-mail attachment
unless you are
expecting it and
it is from a
trusted source
Install a personal
firewall program
Next
Next
Next
Next
p. 564 - 565
Next
Next
Next
Next
Next
Next
Next
Software Theft
What is software theft?
Act of stealing or
illegally stealing
software, copying
software or
intentionally
erasing
programs
Software piracy
is illegal
duplication
of copyrighted
software
Next
Software Theft
What is a license agreement?
Next
Software Theft
What are some other safeguards against software theft?
Product activation allows user to input product
identification number online or by phone and
receive unique installation identification number
Next
Information Theft
What is encryption?
Next
Information Theft
How can I encrypt the contents of files and folders in
Windows Vista?
Next
Information Theft
How do Web browsers provide secure data transmission?
Secure site
is Web site that uses
encryption to secure data
Digital certificate is notice that
guarantees Web site is legitimate
Next
Information Theft
What is a certificate authority (CA)?
Authorized person
or company that
issues and verifies
digital certificates
Users apply for
digital certificate
from CA
Next
Information Theft
What is Secure Sockets Layer (SSL)?
Provides encryption of all data that passes between
client and Internet server
Web addresses
beginning with
https indicate
secure connections
Next
System Failure
What is a system failure?
Prolonged malfunction
of computer
Noiseunwanted
electrical signal
Undervoltagedrop
in electrical supply
p. 574
Next
System Failure
What is a surge protector?
Next
Full
Fullbackup
backup
all
allfiles
filesinincomputer
computer
Selective
Selectivebackup
backup
select
selectwhich
whichfiles
files
totoback
backup
up
Three
-generation
Three-generation
backup
backup
preserves
preserves
three
threecopies
copiesofof
important
importantfiles
files
p. 576
Next
Wireless Security
How can I ensure my wireless communication is
secure?
Next
Software
Software theft
theft
Intellectual
Intellectual property
property
rightsrights
rightsrights to
to which
which
creators
creators are
are entitled
entitled for
for
their
their work
work
Information
Information accuracy
accuracy
Codes
Codes of
of conduct
conduct
Information
Information privacy
privacy
Next
Written guideline
that helps
determine whether
computer action is
ethical
Employers can
distribute to
employees
Next
Information Privacy
What is information privacy?
Right of individuals and companies
to deny or restrict collection and
use of information about them
Difficult to maintain today because
data is stored online
Employee monitoring is using
computers to observe employee
computer use
Legal for employers to use
monitoring software programs
Next
Information Privacy
What are some ways to safeguard personal information?
Fill in only necessary information
on rebate, warranty, and
registration forms
p. 581
Next
Information Privacy
What is an electronic profile?
Next
Information Privacy
What is a cookie?
User
preferences
How
regularly
you visit
Web sites
p. 582
Small file on
your computer
that contains
data about you
Set browser to
accept cookies,
prompt you to
accept cookies,
or disable
cookies
Interests
and
browsing
habits
Next
Information Privacy
How do cookies work?
Next
Information Privacy
What are spyware, adware, and spam?
Spyware is program
placed on computer
without users
knowledge
Adware is a program
that displays online
advertisements
Spam is unsolicited
e-mail message sent
to many recipients
Next
Information Privacy
How can you control spam?
Service that
blocks e-mail
messages from
designated
sources
E-mail filtering
Collects spam in
central location
that you can
view any time
Anti-spam program
Attempts to
remove spam
p. 584
Sometimes
removes valid
e-mail messages
Next
Information Privacy
What is phishing?
p. 584
Next
Information Privacy
What privacy laws have been enacted?
Next
Information Privacy
What privacy laws have been enacted? (contd)
Next
Information Privacy
What is content filtering?
Next
Information Privacy
What is computer forensics?
p. 587
Next
Carpal
Carpal tunnel
tunnel syndrome
syndrome
(CTS)
inflammation of
(CTS)inflammation
of nerve
nerve
that
that connects
connects forearm
forearm to
to palm
palm
Computer
when
Computer addiction
addictionwhen
computer consumes entire
social life
Tendonitis
inflammation of
Tendonitisinflammation
of
tendon
tendon due
due to
to repeated
repeated motion
motion
Next
Next
Next
elbows at 90
and arms and
hands parallel
to floor
adjustable
seat
adjustable
height chair
with 4 or 5
legs for
stability
p. 589 Fig. 11-34
Next
Next
Potential
Potentialcomputer
computerrisks
risks
Safeguards
Safeguardsthat
thatschools,
schools,
business,
and
individuals
business, and individualscan
can
implement
implementto
tominimize
minimizethese
theserisks
risks
Ethical
Ethicalissues
issuessurrounding
surroundinginformation
information
accuracy,
accuracy,intellectual
intellectualproperty
propertyrights,
rights,codes
codes
of
ofconduct,
conduct,and
andinformation
informationprivacy
privacy
Computer-related
Computer-relatedhealth
healthissues,
issues,
their
preventions,
and
ways
their preventions, and waysto
to
keep
keepthe
theenvironment
environmenthealthy
healthy
Wireless
Wirelesssecurity
securityrisks
risksand
andsafeguards
safeguards
Chapter 11 Complete